US20020010786A1 - Data transmitting apparatus and method - Google Patents
Data transmitting apparatus and method Download PDFInfo
- Publication number
- US20020010786A1 US20020010786A1 US09/867,772 US86777201A US2002010786A1 US 20020010786 A1 US20020010786 A1 US 20020010786A1 US 86777201 A US86777201 A US 86777201A US 2002010786 A1 US2002010786 A1 US 2002010786A1
- Authority
- US
- United States
- Prior art keywords
- unit
- data
- server
- firewall
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
Definitions
- the present invention relates to the field of server-client systems, and in particular to a system that includes a client having a firewall and communicates with the server via a wireless communications channel.
- firewalls are often used to provide a single point of entry where a defense can be implemented, allowing access to resources on the Internet, while providing controlled access to the client.
- a connection is established via a firewall, which checks the transmitted data and prevents a direct and secure connection between the client and the server.
- a disadvantage of prior art systems that include a firewall is that the constant checking of the transmitted data does not allow a direct and secure connection between the client and the server.
- Data traffic takes place between a server and a client, via a firewall, such that the firewall prevents further processing and/or forwarding of unallowed data to and/or from at least one of the data processing modules.
- Another modification of the invention specifies that data traffic influenced by the firewall takes place between at least one second data processing module, from which data traffic to the server takes place without influence from the firewall and a first data processing module, from which data traffic to the server takes place under the influence of the firewall.
- This connection assures rapid data exchange between individual secure and insecure data processing modules, without thereby giving up security-specific aspects.
- the firewall checks data which are to be processed further, regardless whether they have been transmitted from the server via a direct non-secure data channel or a secure data channel.
- Data furnished by a data medium are conducted to at least a first data processing module.
- the firewall can prevent data which are furnished by a data medium but which are prohibited from being further processed by and/or forwarded to the first data processing module.
- the firewall is preferably connected between a receiving module and at least one data processing module inside the client.
- Standard-conforming and commercial programs may be used to connect the client to the server.
- development costs can be saved when compared to a special client-server connection, which may require consultation with the server operator or the service provider.
- At least one second data processing module is connected to the receiving module, and thus unhindered data transfer is possible to this second data processing module. Transfers in connection with which no security-specific aspects need to be considered can be handled by this second data processing module.
- the second data processing module is connected to the firewall. In this way, secure data transport is possible between the first and the second data processing module. Unauthorized transfer from the server via the second data processing module to the first data processing module is not possible.
- At least one first data processing module is connected to a data medium.
- the firewall is connected between the first data processing module and the data medium.
- An especially advantageous modification of the invention specifies that the receiving module is simultaneously a transmission module. On the one hand, this permits the usually desirable correspondence with another client connected to the server and, on the other hand, makes possible the retrieval of information from the server.
- the server may be a network server of a public network.
- the method and apparatus of the present invention consequently specify that the system not only satisfies the security-relevant aspects of a limited (local) network, but also those of a publicly accessible network.
- the specified solution permits, for example, a secure connection to a public server (e.g., to do banking business) without having to give up checking the transmitted data.
- a public server e.g., to do banking business
- the expense for adapting the proposed solution remains quite minimal, since no knowledge of the transmission technique itself is necessary.
- the principle of this proposed data transmission system is therefore universally applicable. Thus, for example a connection to any Internet server is also possible.
- the second data processing module includes a browser client.
- the browser client can be a special type for mobile networks (e.g., a WAP browser) and, in the future also a full-featured Internet browser (e.g., Netscape Communicator or Microsoft Internet Explorer type browsers).
- the first data processing module includes an audio unit and/or a video unit.
- the audio unit may contain, for example, functions such as a tuner, amplifier, or an equalizer.
- a video unit integrated into the system can be used as a television or as a picture telephone with a connected camera. The inventive system thus permits any data traffic and especially interactive data traffic.
- the client may be part of a mobile unit.
- the first data processing module may include a navigation unit.
- the navigation unit receives position data and routes calculated on the server through its connection to the public network, and can process the data. For example, a freight-forwarding business can in this way inform its drivers about new jobs and routes.
- the mobile unit may be a motor vehicle such as a car or truck.
- the first data processing module may include a telematic application.
- the telematic application can include telematic services such as dynamic traffic information (VINFO), traffic-jam reports, route recommendations, emergency services, parking and traffic guide information, etc. These applications and services are sensitive to the data that are being processed. For this reason, these data must be checked for the correctness of their content before they are transmitted to or processed by the telematic application, since syntactically correct data with erroneous semantics can disturb the function of the telematic application and thus the function of the particular automobile.
- VINFO dynamic traffic information
- traffic-jam reports e.g., route recommendations, emergency services, parking and traffic guide information, etc.
- FIG. 1 is a block diagram illustration of a first prior art data transmission system
- FIG. 2 is a block diagram illustration of a second prior art data transmission system
- FIG. 3 is a block diagram illustration of a data transmission system according to the present invention.
- FIG. 4 pictorially illustrates data flow in the firewall of the data transmission system of FIG. 3;
- FIG. 5 pictorially illustrates various data flow scenarios in the firewall of the data transmission system of FIG. 3;
- FIG. 6 pictorially illustrates a data flow when requesting an Internet page with telematic (or audio) data in the transmission system of FIG. 3.
- FIG. 3 illustrates a data transmission system according to the present invention.
- FIGS. 1 and 2 illustrate prior art data transmission systems.
- the data transmission systems of FIGS. 1 to 3 illustrate the connection of a motor vehicle to a public network.
- the data transmission system of FIG. 2 does not include a firewall, and there is no checking of the transmitted data.
- the system is thus based essentially on a server 1 b and a client 3 b .
- the client 3 b includes a main unit 310 b , various end devices 320 b , and a communication manager 330 b .
- the main unit 310 b includes a browser client 312 b that contains control logic, various functional units 314 b , which service the browser client 312 b with various device functionalities, a display unit 310 . 1 b, and an input unit 310 . 2 b .
- the display unit 310 . 1 b and the input unit 310 . 2 b are preferably components of an operating unit 314 . 3 b .
- the functional units 314 b also include a network access 314 . 1 b , a unit for local services 314 . 2 b , and other units, generically identified by the reference symbol 314
- a communication manager 330 b includes a network services unit 332 b that provides network functions to the main unit 310 .
- the communication manager 330 b also includes an application download unit 336 b that controls the downloading of firmware and/or software.
- the end devices 320 b include a plurality of units such as a navigation unit 320 . 1 b, an audio unit 320 . 2 b and other conventional units 320 . 4 b.
- the server 1 b is connected to the network services unit 332 b via a gateway 2 b .
- the server-client connection 4 b is preferably a wireless communication link 4 b .
- the network services unit 332 b is connected to the network access unit 314 . 1 b of the main unit 310 .
- the network services unit 332 b is also connected to the individual end devices 320 b , such as for example the navigation unit 320 . 1 b, the audio unit 320 . 2 b , the other units 320 . 4 b , and the local services unit 314 . 2 b.
- the data transmission system illustrated in FIG. 1 is based on a protected data transfer between a client and a server.
- the system illustrated in FIG. 1 is similar to the system illustrated in FIG. 2, however the communications unit manager includes a firewall 334 a .
- the system illustrated in FIG. 2 is again based on a server 1 a and a client 3 a .
- the client 3 a includes a main unit 310 a , various end devices 320 a , and a communication manager 330 a .
- the main unit 310 a again includes a browser client 312 a that contains control logic, various functional units 314 a , which service the browser client 312 a with various device functionalities, a display unit 310 . 1 a, and an input unit 310 . 2 a .
- the display unit 310 . 1 a and the input unit 310 . 2 a are the essential components of an operating unit 314 . 3 a .
- the functional units 314 a include a network access 314 . 1 a, a unit for local services 314 . 2 a , the operating unit 314 . 3 a , and possible other units 314 . 4 .
- the firewall 334 a is connected between the gateway 2 a and the unit for network services 332 a.
- FIG. 3 is a block diagram illustration of a data transmission system according to the present invention.
- the system is based on a server 1 and a client 3 .
- the client 3 includes a main unit 310 , various end devices 320 a and a communication manger 330 .
- the main unit 310 includes a browser client 312 that contains control logic and various functional units 314 , which service the browser client 312 with various device functionalities.
- the main unit 310 also includes a display unit 310 . 1 , and an input unit 310 . 2 .
- the display unit 310 . 1 and the input unit 310 . 2 are components of an operating unit 314 . 3 .
- the functional units 314 include a network access 314 . 1 , a unit for local services 314 . 2 , the already-mentioned operating unit 314 . 3 , and possible other units 314 . 4 .
- the data transmission system of FIG. 3 like the data transmission system of FIG. 1, has a firewall 334 .
- this firewall 334 is not connected between the gateway 2 and the network services unit 332 , as is the case in FIG. 1, but between the network services unit 332 and the individual end devices 320 .
- the firewall 334 is connected to the application download unit 336 as well as to the local services unit 314 . 2 .
- the network services unit 332 , the firewall 334 , and the application download unit 336 are preferably components of the communication manager 330 .
- FIG. 4 is a pictorial illustration of data flow between various components and the firewall 334 .
- the firewall 334 permits data flow between: (i) the local services unit 314 . 2 of the browser client 312 and the individual end devices 320 , (ii) the application download unit 336 and these end devices 320 , (iii) the application download unit 336 and the network services unit 332 , and (iv) the network services unit 332 and the end devices 320 .
- a first example demonstrates how a firmware update of the navigation unit 320 . 1 b proceeds; a second example demonstrates retrieval of an Internet page; a third example describes a telematic application; and a fourth example describes the reception of an audio signal via Wireless Application Protocol (WAP).
- WAP Wireless Application Protocol
- the server 1 autonomously initiates a firmware update of the navigation unit 320 . 1 by transmitting special messages to the application download unit 336 via the network services unit 332 and the firewall 334 in the communication manager 330 .
- the firewall 334 checks the data and discards them if necessary.
- the data flow of this example is identified in FIG. 5 with the reference symbol A.
- the prior art data transmission system of FIG. 1 cannot autonomously perform such a firmware update, since the firewall 334 a will not permit this.
- the prior art data transmission system illustrated in FIG. 2 can autonomously initiate and implement a firmware update of the navigation unit, but there is no data check. As a result, data transfer secured against unauthorized access is not guaranteed.
- the user retrieves a page from the Internet (server 1 ), and immediately sees this displayed directly on the display unit 310 . 1 . If merely a retrieval and display of information are involved, the communication takes place in the standardized region between the browser client 312 and the server 1 (i.e., there is not data transfer via the firewall 334 ). In principle, any arbitrary Internet page can be retrieved and displayed. Which pages are displayed depends on the browser client 312 that is being used.
- vehicle-specific data are to be downloaded and processed further (e.g., the transfer of position data to the navigation unit 320 . 1 ) these data are checked by the firewall 334 of the communication manager 330 , and subsequently are either forwarded or discarded. If the data are forwarded, data flow takes place through the firewall 334 . This data flow is identified in FIG. by the reference symbol B.
- these data can be traffic information, traffic-jam information, or accident information. These are transmitted directly from a server to the navigation unit.
- the data are generally retrieved by the operator via the operating unit 314 . 3 or the input unit 310 . 2 , the network access 314 . 1 , the network services unit 332 , the gateway 2 to the server 1 .
- This request data stream (i.e., the route of the data request) is identified in FIG. 6 with the reference symbols X 1 , X 2 , X 3 , and X 4 .
- the data are then transmitted from the server 1 via the gateway 2 to the network services unit 332 , and from there further via the network access 314 . 1 , the local services unit 314 . 2 , the firewall 334 , to the telematic application 320 . 3 .
- the route of data transmission is identified in FIG. 6 by the reference symbols Y 1 , Y 2 , Y 3 , Y 4 , and Y 5 .
- the user of the vehicle retrieves an Internet page that offers audio data.
- the user chooses an audio file, which subsequently is transmitted to the audio unit 320 . 2 .
- the audio unit then plays this audio data stream.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Photoreceptors In Electrophotography (AREA)
- Reduction Or Emphasis Of Bandwidth Of Signals (AREA)
Abstract
Data transmitted between a server and a client with a data processing module and with a firewall, is investigated by the firewall for security-specific aspects. The firewall controls the data traffic such that further processing and/or forwarding of unallowed data to and/or from at least one of the data processing modules.
Description
- The present invention relates to the field of server-client systems, and in particular to a system that includes a client having a firewall and communicates with the server via a wireless communications channel.
- When a direct connection from a client computing device to a server is established, there is no checking of the transmitted data. As a result, free access from the client to the server, and free access from the server to the client are both possible.
- If the server is within a public network, then in principle every subscriber to the public network as well as the server itself has access to the client. Therefore, unauthorized access to the client is also possible. In the past, it has frequently become apparent what devastating effects and consequences such unauthorized access can have. To restrict access, firewalls are often used to provide a single point of entry where a defense can be implemented, allowing access to resources on the Internet, while providing controlled access to the client.
- Between the client and the server a connection is established via a firewall, which checks the transmitted data and prevents a direct and secure connection between the client and the server. A disadvantage of prior art systems that include a firewall is that the constant checking of the transmitted data does not allow a direct and secure connection between the client and the server.
- Therefore, there is a need for a data transmission method and apparatus in which a direct connection between the client and the server exists, and transmitted data can be checked in accordance with security-specific aspects to prevent unauthorized access.
- Data traffic takes place between a server and a client, via a firewall, such that the firewall prevents further processing and/or forwarding of unallowed data to and/or from at least one of the data processing modules.
- Data traffic uninfluenced by the firewall takes place between the server and at least one second data processing module. This is especially appropriate when information is to be exchanged that does not contain security-relevant data and, on the basis of which, no independent processes are initiated. Nevertheless, it continues to be assured that the data flow between the first processing module and the server is checked in accordance with security-specific aspects and that the transfer is prohibited in certain circumstances.
- Another modification of the invention specifies that data traffic influenced by the firewall takes place between at least one second data processing module, from which data traffic to the server takes place without influence from the firewall and a first data processing module, from which data traffic to the server takes place under the influence of the firewall. This connection assures rapid data exchange between individual secure and insecure data processing modules, without thereby giving up security-specific aspects. The firewall checks data which are to be processed further, regardless whether they have been transmitted from the server via a direct non-secure data channel or a secure data channel.
- Data furnished by a data medium are conducted to at least a first data processing module. The firewall can prevent data which are furnished by a data medium but which are prohibited from being further processed by and/or forwarded to the first data processing module.
- The firewall is preferably connected between a receiving module and at least one data processing module inside the client. Standard-conforming and commercial programs may be used to connect the client to the server. As a result, development costs can be saved when compared to a special client-server connection, which may require consultation with the server operator or the service provider.
- At least one second data processing module is connected to the receiving module, and thus unhindered data transfer is possible to this second data processing module. Transfers in connection with which no security-specific aspects need to be considered can be handled by this second data processing module.
- The second data processing module is connected to the firewall. In this way, secure data transport is possible between the first and the second data processing module. Unauthorized transfer from the server via the second data processing module to the first data processing module is not possible.
- At least one first data processing module is connected to a data medium. In addition, in one embodiment, the firewall is connected between the first data processing module and the data medium.
- An especially advantageous modification of the invention specifies that the receiving module is simultaneously a transmission module. On the one hand, this permits the usually desirable correspondence with another client connected to the server and, on the other hand, makes possible the retrieval of information from the server.
- The server may be a network server of a public network. The method and apparatus of the present invention consequently specify that the system not only satisfies the security-relevant aspects of a limited (local) network, but also those of a publicly accessible network. The specified solution permits, for example, a secure connection to a public server (e.g., to do banking business) without having to give up checking the transmitted data. Furthermore, if in the future new transmission networks are developed and used, the expense for adapting the proposed solution remains quite minimal, since no knowledge of the transmission technique itself is necessary. The principle of this proposed data transmission system is therefore universally applicable. Thus, for example a connection to any Internet server is also possible.
- In a preferred embodiment, the second data processing module includes a browser client. The browser client can be a special type for mobile networks (e.g., a WAP browser) and, in the future also a full-featured Internet browser (e.g., Netscape Communicator or Microsoft Internet Explorer type browsers).
- The first data processing module includes an audio unit and/or a video unit. The audio unit may contain, for example, functions such as a tuner, amplifier, or an equalizer. A video unit integrated into the system can be used as a television or as a picture telephone with a connected camera. The inventive system thus permits any data traffic and especially interactive data traffic.
- The client may be part of a mobile unit.
- The first data processing module may include a navigation unit. The navigation unit receives position data and routes calculated on the server through its connection to the public network, and can process the data. For example, a freight-forwarding business can in this way inform its drivers about new jobs and routes.
- The mobile unit may be a motor vehicle such as a car or truck.
- The first data processing module may include a telematic application. The telematic application can include telematic services such as dynamic traffic information (VINFO), traffic-jam reports, route recommendations, emergency services, parking and traffic guide information, etc. These applications and services are sensitive to the data that are being processed. For this reason, these data must be checked for the correctness of their content before they are transmitted to or processed by the telematic application, since syntactically correct data with erroneous semantics can disturb the function of the telematic application and thus the function of the particular automobile.
- These and other objects, features and advantages of the present invention will become more apparent in light of the following detailed description of preferred embodiments thereof, as illustrated in the accompanying drawings.
- FIG. 1 is a block diagram illustration of a first prior art data transmission system;
- FIG. 2 is a block diagram illustration of a second prior art data transmission system;
- FIG. 3 is a block diagram illustration of a data transmission system according to the present invention;
- FIG. 4 pictorially illustrates data flow in the firewall of the data transmission system of FIG. 3;
- FIG. 5 pictorially illustrates various data flow scenarios in the firewall of the data transmission system of FIG. 3; and
- FIG. 6 pictorially illustrates a data flow when requesting an Internet page with telematic (or audio) data in the transmission system of FIG. 3.
- FIG. 3 illustrates a data transmission system according to the present invention. To clarify how this inventive data transmission system differs from those of the prior art, FIGS. 1 and 2 illustrate prior art data transmission systems. In one embodiment, the data transmission systems of FIGS.1 to 3 illustrate the connection of a motor vehicle to a public network.
- The data transmission system of FIG. 2 does not include a firewall, and there is no checking of the transmitted data. The system is thus based essentially on a
server 1 b and aclient 3 b. Theclient 3 b includes amain unit 310 b,various end devices 320 b, and acommunication manager 330 b. Themain unit 310 b includes abrowser client 312 b that contains control logic, variousfunctional units 314 b, which service thebrowser client 312 b with various device functionalities, a display unit 310.1 b, and an input unit 310.2 b. The display unit 310.1 b and the input unit 310.2 b are preferably components of an operating unit 314.3 b. Thefunctional units 314 b also include a network access 314.1 b, a unit for local services 314.2 b, and other units, generically identified by the reference symbol 314.4 b. - A
communication manager 330 b includes anetwork services unit 332 b that provides network functions to themain unit 310. Thecommunication manager 330 b also includes anapplication download unit 336 b that controls the downloading of firmware and/or software. Theend devices 320 b include a plurality of units such as a navigation unit 320.1 b, an audio unit 320.2 b and other conventional units 320.4 b. - The
server 1 b is connected to thenetwork services unit 332 b via agateway 2 b. The server-client connection 4 b is preferably awireless communication link 4 b. Thenetwork services unit 332 b is connected to the network access unit 314.1 b of themain unit 310. Thenetwork services unit 332 b is also connected to theindividual end devices 320 b, such as for example the navigation unit 320.1 b, the audio unit 320.2 b, the other units 320.4 b, and the local services unit 314.2 b. - The data transmission system illustrated in FIG. 1 is based on a protected data transfer between a client and a server. The system illustrated in FIG. 1 is similar to the system illustrated in FIG. 2, however the communications unit manager includes a
firewall 334 a. The system illustrated in FIG. 2 is again based on aserver 1 a and aclient 3 a. Theclient 3 a includes amain unit 310 a,various end devices 320 a, and acommunication manager 330 a. - The
main unit 310 a again includes abrowser client 312 a that contains control logic, variousfunctional units 314 a, which service thebrowser client 312 a with various device functionalities, a display unit 310.1 a, and an input unit 310.2 a. The display unit 310.1 a and the input unit 310.2 a are the essential components of an operating unit 314.3 a. Thefunctional units 314 a include a network access 314.1 a, a unit for local services 314.2 a, the operating unit 314.3 a, and possible other units 314.4. Thefirewall 334 a is connected between thegateway 2 a and the unit fornetwork services 332 a. - FIG. 3 is a block diagram illustration of a data transmission system according to the present invention. The system is based on a
server 1 and aclient 3. Theclient 3 includes amain unit 310,various end devices 320 a and acommunication manger 330. - The
main unit 310 includes abrowser client 312 that contains control logic and variousfunctional units 314, which service thebrowser client 312 with various device functionalities. Themain unit 310 also includes a display unit 310.1, and an input unit 310.2. - The display unit310.1 and the input unit 310.2 are components of an operating unit 314.3. The
functional units 314 include a network access 314.1, a unit for local services 314.2, the already-mentioned operating unit 314.3, and possible other units 314.4. - The data transmission system of FIG. 3, like the data transmission system of FIG. 1, has a
firewall 334. However, thisfirewall 334 is not connected between thegateway 2 and thenetwork services unit 332, as is the case in FIG. 1, but between thenetwork services unit 332 and theindividual end devices 320. Furthermore, thefirewall 334 is connected to theapplication download unit 336 as well as to the local services unit 314.2. Thenetwork services unit 332, thefirewall 334, and theapplication download unit 336 are preferably components of thecommunication manager 330. - FIG. 4 is a pictorial illustration of data flow between various components and the
firewall 334. Thefirewall 334 permits data flow between: (i) the local services unit 314.2 of thebrowser client 312 and theindividual end devices 320, (ii) theapplication download unit 336 and theseend devices 320, (iii) theapplication download unit 336 and thenetwork services unit 332, and (iv) thenetwork services unit 332 and theend devices 320. - To clarify the inventive principle, four examples of data transfer via the
firewall 334 will be presented below. A first example demonstrates how a firmware update of the navigation unit 320.1 b proceeds; a second example demonstrates retrieval of an Internet page; a third example describes a telematic application; and a fourth example describes the reception of an audio signal via Wireless Application Protocol (WAP). - Referring to FIG. 3, the
server 1 autonomously initiates a firmware update of the navigation unit 320.1 by transmitting special messages to theapplication download unit 336 via thenetwork services unit 332 and thefirewall 334 in thecommunication manager 330. Thefirewall 334 checks the data and discards them if necessary. The data flow of this example is identified in FIG. 5 with the reference symbol A. - In contrast, the prior art data transmission system of FIG. 1 cannot autonomously perform such a firmware update, since the
firewall 334 a will not permit this. The prior art data transmission system illustrated in FIG. 2 can autonomously initiate and implement a firmware update of the navigation unit, but there is no data check. As a result, data transfer secured against unauthorized access is not guaranteed. - Referring to FIG. 3, in the
browser client 312, the user retrieves a page from the Internet (server 1), and immediately sees this displayed directly on the display unit 310.1. If merely a retrieval and display of information are involved, the communication takes place in the standardized region between thebrowser client 312 and the server 1 (i.e., there is not data transfer via the firewall 334). In principle, any arbitrary Internet page can be retrieved and displayed. Which pages are displayed depends on thebrowser client 312 that is being used. - As soon as vehicle-specific data are to be downloaded and processed further (e.g., the transfer of position data to the navigation unit320.1) these data are checked by the
firewall 334 of thecommunication manager 330, and subsequently are either forwarded or discarded. If the data are forwarded, data flow takes place through thefirewall 334. This data flow is identified in FIG. by the reference symbol B. - In contrast, in the prior art system illustrated in FIG. 1, an Internet page can be retrieved, but the incoming data are always checked for security-specific aspects. A direct connection is not possible and data traffic is inhibited. If truly security-relevant data are transmitted, this constant checking is appropriate. Otherwise, a troublesome delay occurs.
- In the prior art system illustrated in FIG. 2, it is always possible to retrieve an Internet page since there is no firewall, and as a result, unhindered data traffic takes place. Even security-relevant data are not checked.
- There are special methods for transmitting telematic data to the motor vehicle. For example, these data can be traffic information, traffic-jam information, or accident information. These are transmitted directly from a server to the navigation unit. The data are generally retrieved by the operator via the operating unit314.3 or the input unit 310.2, the network access 314.1, the
network services unit 332, thegateway 2 to theserver 1. This request data stream (i.e., the route of the data request) is identified in FIG. 6 with the reference symbols X1, X2, X3, and X4. - The data are then transmitted from the
server 1 via thegateway 2 to thenetwork services unit 332, and from there further via the network access 314.1, the local services unit 314.2, thefirewall 334, to the telematic application 320.3. The route of data transmission is identified in FIG. 6 by the reference symbols Y1, Y2, Y3, Y4, and Y5. - The data flow in the firewall304 is shown by the arrows with the reference symbols C in FIG. 5.
- The user of the vehicle, for example, retrieves an Internet page that offers audio data. The user chooses an audio file, which subsequently is transmitted to the audio unit320.2. The audio unit then plays this audio data stream.
- For the data transfer in the systems according to FIGS. 1 and 2, the discussions regarding the
exemplary scenarios - Although the present invention has been shown and described with respect to several preferred embodiments thereof, various changes, omissions and additions to the form and detail thereof, may be made therein, without departing from the spirit and scope of the invention.
Claims (1)
1. A client automobile computing system that communicates over a wireless communication channel with a server, said client automobile computing system comprising:
a main unit that includes (i) a browser client component, (ii) a plurality of functional units including a local services unit that each service said browser client, (iii) a display unit and (iv) an input unit;
a communications manager component that includes
(i) a network services unit that receives data from the server and transmits data to the server;
(ii) an application download unit;
(iii) a firewall positioned between said network services unit and said application download unit; and
a plurality of electronic devices including a navigation unit and an audio unit that receive data from and send data to said firewall, wherein
said firewall permits data flow between: (i) said local services unit and said navigation unit and said audio unit, (ii) said application download unit and said navigation unit and said audio unit (iii) said application download unit and said network services unit, and (iv) said network services unit and said navigation unit and said audio unit.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10025929A DE10025929B4 (en) | 2000-05-26 | 2000-05-26 | Method for transmitting data |
DE10025929.4 | 2000-05-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020010786A1 true US20020010786A1 (en) | 2002-01-24 |
Family
ID=7643536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/867,772 Abandoned US20020010786A1 (en) | 2000-05-26 | 2001-05-29 | Data transmitting apparatus and method |
Country Status (4)
Country | Link |
---|---|
US (1) | US20020010786A1 (en) |
EP (1) | EP1158747B8 (en) |
AT (1) | ATE300828T1 (en) |
DE (2) | DE10025929B4 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133491A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and system for managing distributed content and related metadata |
US20050136892A1 (en) * | 2003-12-19 | 2005-06-23 | General Motors Corporation | WIFI authentication method |
US20050246703A1 (en) * | 2002-06-18 | 2005-11-03 | Petri Ahonen | Method and apparatus for programming updates from a network unit to a mobile device |
WO2006018244A2 (en) * | 2004-08-19 | 2006-02-23 | Volkswagen Ag | Transmission of data to a vehicle |
CN107957858A (en) * | 2017-12-25 | 2018-04-24 | 瀚科科技(大连)有限公司 | A kind of primary and secondary synchronous display apparatus |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10225550A1 (en) * | 2002-06-06 | 2003-12-18 | Volkswagen Ag | Communication platform in a motor vehicle |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6072431A (en) * | 1997-11-13 | 2000-06-06 | Trimble Navigation Limited | Extensible GPS receiver system |
US6161071A (en) * | 1999-03-12 | 2000-12-12 | Navigation Technologies Corporation | Method and system for an in-vehicle computing architecture |
US6389337B1 (en) * | 2000-04-24 | 2002-05-14 | H. Brock Kolls | Transacting e-commerce and conducting e-business related to identifying and procuring automotive service and vehicle replacement parts |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5732074A (en) * | 1996-01-16 | 1998-03-24 | Cellport Labs, Inc. | Mobile portable wireless communication system |
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US6292833B1 (en) * | 1998-07-17 | 2001-09-18 | Openwave Systems Inc. | Method and apparatus for providing access control to local services of mobile devices |
US6496935B1 (en) * | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
-
2000
- 2000-05-26 DE DE10025929A patent/DE10025929B4/en not_active Revoked
-
2001
- 2001-05-19 DE DE50106861T patent/DE50106861D1/en not_active Expired - Lifetime
- 2001-05-19 EP EP01112307A patent/EP1158747B8/en not_active Revoked
- 2001-05-19 AT AT01112307T patent/ATE300828T1/en not_active IP Right Cessation
- 2001-05-29 US US09/867,772 patent/US20020010786A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6072431A (en) * | 1997-11-13 | 2000-06-06 | Trimble Navigation Limited | Extensible GPS receiver system |
US6161071A (en) * | 1999-03-12 | 2000-12-12 | Navigation Technologies Corporation | Method and system for an in-vehicle computing architecture |
US6389337B1 (en) * | 2000-04-24 | 2002-05-14 | H. Brock Kolls | Transacting e-commerce and conducting e-business related to identifying and procuring automotive service and vehicle replacement parts |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133491A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and system for managing distributed content and related metadata |
US20050246703A1 (en) * | 2002-06-18 | 2005-11-03 | Petri Ahonen | Method and apparatus for programming updates from a network unit to a mobile device |
US20050136892A1 (en) * | 2003-12-19 | 2005-06-23 | General Motors Corporation | WIFI authentication method |
US7548744B2 (en) * | 2003-12-19 | 2009-06-16 | General Motors Corporation | WIFI authentication method |
WO2006018244A2 (en) * | 2004-08-19 | 2006-02-23 | Volkswagen Ag | Transmission of data to a vehicle |
WO2006018244A3 (en) * | 2004-08-19 | 2006-05-11 | Volkswagen Ag | Transmission of data to a vehicle |
CN107957858A (en) * | 2017-12-25 | 2018-04-24 | 瀚科科技(大连)有限公司 | A kind of primary and secondary synchronous display apparatus |
Also Published As
Publication number | Publication date |
---|---|
ATE300828T1 (en) | 2005-08-15 |
EP1158747B1 (en) | 2005-07-27 |
DE10025929B4 (en) | 2006-02-16 |
EP1158747B8 (en) | 2005-09-28 |
EP1158747A3 (en) | 2003-07-30 |
EP1158747A2 (en) | 2001-11-28 |
DE50106861D1 (en) | 2005-09-01 |
DE10025929A1 (en) | 2001-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7039708B1 (en) | Apparatus and method for establishing communication in a computer network | |
EP1008087B1 (en) | Method and apparatus for remote network access logging and reporting | |
US6212640B1 (en) | Resources sharing on the internet via the HTTP | |
US5809252A (en) | Cable modem interface unit for capturing and processing incoming packets from a cable modem | |
US6334056B1 (en) | Secure gateway processing for handheld device markup language (HDML) | |
US7310516B1 (en) | Method and system for providing advanced notice of cost to access web content | |
US20050228984A1 (en) | Web service gateway filtering | |
US6163844A (en) | Method for granting accesses to information in a distributed computer system | |
KR100330615B1 (en) | Method and system for using a cellular phone as a network gateway in an automotive network | |
US8190773B2 (en) | System and method for accessing a web server on a device with a dynamic IP-address residing behind a firewall | |
US10298492B2 (en) | System and method for interworking between vehicle controller and external resource | |
US20040152446A1 (en) | Method for providing network access to a mobile terminal and corresponding network | |
US20080140571A1 (en) | Method for controlling the distribution of vehicle-related data | |
US6912593B2 (en) | Information switching platform | |
US7277915B2 (en) | Application-based protocol and proxy selection by a mobile device in a multi-protocol network environment | |
CN112702336A (en) | Security control method and device for government affair service, security gateway and storage medium | |
US20070136802A1 (en) | Firewall device | |
US8042166B2 (en) | Printing via user equipment | |
US20020010786A1 (en) | Data transmitting apparatus and method | |
EP1305920A1 (en) | A method of communication | |
CN114125027A (en) | Communication establishing method and device, electronic equipment and storage medium | |
US5912896A (en) | Cable modem interface unit for generating and transmitting reply control packets | |
US20150113125A1 (en) | System and Method for Providing the Status of Safety Critical Systems to Untrusted Devices | |
CN100592736C (en) | Context management system for a network comprising a heterogeneous group of terminals | |
US9282079B2 (en) | Microkernel gateway server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BECKER GMBH, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANDES, AXEL;BEHRENS, RALPH;REEL/FRAME:012149/0167 Effective date: 20010606 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |